Category: Hardening

Kerberos Authentication with Veeam v12

Kerberos Authentication with Veeam v12. NTLM authentication is still mandatory for communication between all Veeam infrastructure servers in v11. However, NTLM authentication is still required for communication between Veeam backup infrastructure servers (backup server, backup proxies, backup repositories, guest interaction proxies, log shipping servers, and mount servers). NTLM was subject to several known security vulnerabilities …

Continue reading

Advertisement

Defending Against Crypto-Ransomware with Netwrix

Hi, today we will discuss about data governance and more especially a software called: Netwrix Auditor. Netwrix Auditor is a visibility and governance platform that enables control over changes, configurations, and access in hybrid cloud IT environments to protect unstructured data regardless of its location. The platform provides security analytics to detect anomalies in user …

Continue reading

Advertisement

Conti initiates their attacks on Backup

Cyber groups (cartels) specifically target backup solutions in order to ensure that the victim has no other option except for paying the ransom. Conti group is particularly methodical in developing and implementing backup removal techniques (on-premise and cloud). The full analysis is available here (thanks to ADV INTEL) and is based on their actual proactive …

Continue reading

Advertisement

Veeam Hardened Linux Repository – Part I

Hello, before tackling the subject of your presence, allow me to briefly introduce myself: I am Philippe DUPUIS, I‘m a french Data Management and Security engineer working with Christopher (Be indulgent if you notice some English grammar failures, my mother tongue is French 😊). I specialize in Data Protection and Governance, Disaster Recovery, Security, Cloud …

Continue reading

Protect your Backup against Ransomware

Regular backups of all data, including data on file servers, infrastructure, and critical business applications should be performed. Keep in mind that these backups can also be affected by ransomware. Protect your backup against Ransomware. Indeed, more and more cybercriminals seek to attack backups to limit the possibilities for the victim to find his data …

Continue reading

error

Enjoy this blog? Please spread the word :)